-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SecurityContextConstraints: update description of the Priority field #15425
SecurityContextConstraints: update description of the Priority field #15425
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM. May want to quote "nil" so it is obvious it's a literal value. Otherwise it looks like it should be capitalized to me 😄
7ef958a
to
56452ce
Compare
@pweil- Thanks! I've added quotes. |
LGTM [test] |
Evaluated for origin test up to 56452ce |
continuous-integration/openshift-jenkins/test FAILURE (https://ci.openshift.redhat.com/jenkins/job/test_pull_request_origin/3441/) (Base Commit: 74121fa) (PR Branch Commit: 56452ce) |
Test flake #13536 |
@mfojtik And this one too, please :) |
pkg/security/apis/security/types.go
Outdated
@@ -16,7 +16,9 @@ type SecurityContextConstraints struct { | |||
|
|||
// Priority influences the sort order of SCCs when evaluating which SCCs to try first for | |||
// a given pod request based on access in the Users and Groups fields. The higher the int, the | |||
// higher priority. If scores for multiple SCCs are equal they will be sorted by name. | |||
// higher priority. "nil" is considered a 0 priority. If scores for multiple SCCs are equal they |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
i guess "nil" is not what you use when you want to set this via api (iow. you don't do "priority": "nil"
. I would use the word "not set" instead of "nil".
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've updated it to "An unset value is considered a 0 priority." PTAL
@php-coder one comment, /approved |
56452ce
to
dc63045
Compare
It failed because of #15579 |
/test extended_conformance_install_update |
/retest |
@stevekuznetsov @deads2k This PR modifies API-related files and hence has "needs-api-review" tag but it changes only a comment. What is a procedure for merging such PRs? |
@php-coder you should probably get a review from someone in @openshift/sig-security since the comments are exposed to end-users |
/test extended_templates |
@openshift/security PTAL |
/lgtm |
/approved |
@Kargakis looks like we need to honor the |
@deads2k already asked for it; we need to move path-label in a prow plugin and make it configurable so that it can choose from a whitelist what labels to add either once or always. Not a high priority. |
Meaning we need to sort out cherry-picks and flake detection first. |
@stevekuznetsov @Kargakis Could someone then merge it manually? |
@php-coder it will merge fine even with the label |
/approve |
@stevekuznetsov ... but when? |
What if I don't want to wait when @mfojtik came back from his PTO to merge a trivial PR that updates only comments? Is it possible with our infrastructure? |
@php-coder as soon as my name gets added to owners #15712 |
You miss an
Sorry if it may not be obvious enough. We should create a document that aggregates explanations for all of our new CI tools, I think @stevekuznetsov has made a start. |
I see the bot added a comment: #15425 (comment)
|
Hm. Thank you for teaching me. Probably, I didn't understand how it works before and thought that approval from one person is enough to have |
You need an approval from one person from each of the directories that it touches. The bot says so in the comment:
If we changed more than one directory, they would all be listed there. An approval from someone in a top-level dir will approve dirs underneath. Since this has been LGTMed by @pweil- and @mfojtik I'll /approve @php-coder please let us know if the UX is not optimal, but also please be sure to read the comments the bot writes. The extra complexity does give us benefits -- requiring LGTM and approval gives a small set of approvers ability to delegate nitty-gritty reviews to reviewers, requiring approval from all the dirs allows us to ensure a code change gets looked at by all the right people, etc. |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: php-coder, pweil-, simo5, stevekuznetsov The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these OWNERS Files:
You can indicate your approval by writing |
/test all [submit-queue is verifying that this PR is safe to merge] |
Automatic merge from submit-queue |
Sync description with reality and documentation.
PTAL @pweil-
CC @simo5